![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
This post was originally published here by Prasidh Srikanth.
Recently, Bitglass participated in the Cyber Security Conference in Chicago. At our booth, we were listening to customer stories about how they are strengthening their cybersecurity and adapting to changing technological trends; specifically,Ā cloudĀ andĀ bring your own device (BYOD). Whether we spoke with universities or financial services organizations, everyone wanted to know more about the latest technology and how they should protect data as it moves beyond the corporate firewall.
Cloud and mobile enhance productivity and collaboration among enterprise users, but can also introduce the risk of data leakage if they are not properly secured. The mobile phone is no longer just about calls or texts ā itās also about apps. Similarly, security is no longer just about the corporate network ā itās about securing your dataĀ whereverĀ it goes.
To achieve the above, enterprises must understand the shared responsibility model of security. In this model, cloud service providers likeĀ AmazonĀ andĀ SalesforceĀ take responsibility only for the āsecurity of the cloud,ā meaning the infrastructure and underlying items that keep the cloud functional. āSecurity in the cloud,ā on the other hand, involves securing theĀ useĀ of the cloud, and is the responsibility of the enterprises deploying cloud services.
āSecurity in the cloudā revolves around identity,Ā visibility,Ā data protection, andĀ threat protection. Upon realizing the specialized knowledge and technology that these require, many entrust their cybersecurity toĀ cloud access security brokers (CASBs)Ā so that their companies can focus on the things that they do best. For those that are unfamiliar with the technology, think of a CASB as a visibility and control point in the cloud that can monitor traffic from the time a user logs in to the time that she or he logs out, enforcing risk-based policies as needed in real time.
During the conference in Chicago, we informed many companies about the things to look out for when they evaluate competing cloud access security brokers. As the Next-Gen CASB, Bitglassā unique value proposition about securing any app and any device was very well received by the showās attendees.
Our agentless architecture was the standout feature throughout all of our discussions. As no software installations are required, there are no interruptions or headaches for users and IT departments. This is a massive departure from other tools that require the use of agents. Bitglassā real-time security features protect your data everywhere, whether youāre in the office, at a Starbucks, or at home. Regardless of the user, app, device, or location, the Next-Gen CASB offers comprehensive visibility and control in real time.
Photo:FinancesOnline.com